![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer communications & networking
This book is the result of the first International Conference ICT Innovations 2009. The ICT Innovations conference is the primary scientific action of the Macedonian Society on Information and Communication Technologies (ICT-ACT). It promotes the publication of scientific results of the international community related to innovative fundamental and applied research in ICT. Today, ICT has enlarged its horizons and it is practiced under multidisciplinary contexts that introduce new challenges to theore- cal and technical approaches. The ICT Innovations 2009 conference gathered academics, professionals and pr- titioners reporting their valuable experiences in developing solutions and systems in the industrial and business arena especially innovative commercial implementations, novel applications of technology, and experience in applying recent research advances to practical situations, in any ICT areas. The conference focuses on issues concerning a variety of ICT fields like: * Multimedia Information Systems * Artificial Intelligence * Pervasive and Ubiquitous Computing * Eco and Bio Informatics * Internet and Web Applications and Services * Wireless and Mobile Communications and Services * Computer Networks, Security and Cryptography * Distributed Systems, GRID and Cloud Computing ICT Innovations 2009 Conference was held in Ohrid, Macedonia, in September 28-30, 2009. Local arrangements provided by the members of the Macedonian Society on Information and Communication Technologies - ICT-ACT, mainly consisting of teaching and research staff of Computer Science Department at Faculty of Electrical Engineering and Information Technologies and Institute of Informatics at Faculty of Natural Sciences, both at Ss. Cyril and Methodius University in Skopje, Macedonia.
The objective of the 2nd International Conference on Green Communications and Networks 2012 (GCN 2012) is to facilitate an exchange of information on best practices for the latest research advances in the area of communications, networks and intelligence applications. These mainly involve computer science and engineering, informatics, communications and control, electrical engineering, information computing, and business intelligence and management. "Proceedings of the 2nd International Conference on Green Communications and Networks 2012 (GCN 2012)" will focus on green information technology and applications, which will provide in-depth insights for engineers and scientists in academia, industry, and government. The book addresses the most innovative research developments including technical challenges, social and economic issues, and presents and discusses the authors' ideas, experiences, findings, and current projects on all aspects of advanced green information technology and applications. Yuhang Yang is a professor at the Department of Electronic Engineering, Shanghai Jiao Tong University. Maode Ma is an associate professor at the School of Electrical & Electronic Engineering, Nanyang Technological University.
"Content Delivery Networks" enables the readers to understand the basics, to identify the underlying technology, to summarize their knowledge on concepts, ideas, principles and various paradigms which span on broad CDNs areas. Therefore, aspects of CDNs in terms of basics, design process, practice, techniques, performances, platforms, applications, and experimental results have been presented in a proper order. Fundamental methods, initiatives, significant research results, as well as references for further study have also been provided. Comparison of different design and development approaches are described at the appropriate places so that new researchers as well as advanced practitioners can use the CDNs evaluation as a research roadmap. All the contributions have been reviewed, edited, processed, and placed in the appropriate order to maintain consistency so that any reader irrespective of their level of knowledge and technological skills in CDNs would get the most out of it. The book is organized into three parts, namely, Part I: CDN Fundamentals; Part II: CDN Modeling and Performance; and Part III: Advanced CDN Platforms and Applications. The organization ensures the smooth flow of material as successive chapters build on prior ones.
Juniper Networks Secure Access SSL VPN appliances provide a
complete range of remote access appliances for the smallest
companies up to the largest service providers. This comprehensive
configuration guide will allow system administrators and security
professionals to configure these appliances to allow remote and
mobile access for employees. If you manage and secure a larger
enterprise, this book will help you to provide remote and/or
extranet access for employees, partners, and customers from a
single platform.
With the evolution of digitised data, our society has become dependent on services to extract valuable information and enhance decision making by individuals, businesses, and government in all aspects of life. Therefore, emerging cloud-based infrastructures for storage have been widely thought of as the next generation solution for the reliance on data increases. Data Intensive Storage Services for Cloud Environments provides an overview of the current and potential approaches towards data storage services and its relationship to cloud environments. This reference source brings together research on storage technologies in cloud environments and various disciplines useful for both professionals and researchers.
This book explores current and emerging trends in policy, strategy, and practice related to cyber operations conducted by states and non-state actors. The book examines in depth the nature and dynamics of conflicts in the cyberspace, the geopolitics of cyber conflicts, defence strategy and practice, cyber intelligence and information security.
This book presents new concepts as well as practical applications and experiences in the field of information technology for environmental engineering. The book has three main focus areas: firstly, it shows how information technologies can be employed to support natural resource management and conservation, environmental engineering, scientific simulation and integrated assessment studies. Secondly, it demonstrates the application of computing in the everyday practices of environmental engineers, natural scientists, economists and social scientists. And thirdly, it demonstrates how the complexity of natural phenomena can be approached using interdisciplinary methods, where computer science offers the infrastructure needed for environmental data collection and management, scientific simulations, decision support documentation and reporting.The book collects selected papers presented at the 7th International Symposium on Environmental Engineering, held in Port Elizabeth, South Africa in July 2015. It discusses recent success stories in eco-informatics, promising ideas and new challenges from the interdisciplinary viewpoints of computer scientists, environmental engineers, economists and social scientists, demonstrating new paradigms for problem-solving and decision-making.
This book describes, analyzes, and recommends traffic engineering
(TE) and quality of service (QoS) optimization methods for
integrated voice/data dynamic routing networks. These functions
control a network's response to traffic demands and other stimuli,
such as link failures or node failures. TE and QoS optimization is
concerned with measurement, modeling, characterization, and control
of network traffic, and the application of techniques to achieve
specific performance objectives. The scope of the analysis and
recommendations include dimensioning, call/flow and connection
routing, QoS resource management, routing table management, dynamic
transport routing, and operational requirements. Case studies are
included which provide the reader with a concrete way into the
technical details and highlight why and how to use the techniques
described in the book.
IPv6 was introduced in 1994 and has been in development at the IETF for over 10 years. It has now reached the deployment stage. KAME, the de-facto open-source reference implementation of the IPv6 standards, played a significant role in the acceptance and the adoption of the IPv6 technology. The adoption of KAME by key companies in a wide spectrum of commercial products is a testimonial to the success of the KAME project, which concluded not long ago. This book is the first and the only one of its kind, which
reveals all of the details of the KAME IPv6 protocol stack,
explaining exactly what every line of code does and why it was
designed that way. Through the dissection of both the code and its
design, the authors illustrate how IPv6 and its related protocols
have been interpreted and implemented from the specifications. This
reference will demystify those ambiguous areas in the standards,
which are open to interpretation and problematic in deployment, and
presents solutions offered by KAME in dealing with these
implementation challenges.
Recent corporate events have exposed the frequency and consequences
of poor system security implementations and inadequate protection
of private information. In a world of increasingly complex
computing environments, myriad compliance regulations and the
soaring costs of security breaches, it is economically essential
for companies to become proactive in implementing effective system
and data security measures. This volume is a comprehensive
reference for understanding security risks, mitigations and best
practices as they apply to the various components of these
business-critical computing environments.
In this book we summarize important developments in telecommunications with a focus on Signalling System No. 7 (SS 7) network reliability. But why is SS 7 network security and reliability so important? According to the Open Systems Interconnection (OSI) model the term "network" refers to the Layer 3 network service, which is offered by the Message Transfer Part (MTP) and Signalling Connection Control Part (SCCP) to higher layers. An SS 7 network outage results in a breakdown of signalling between the individual nodes of the network, so that telecommunication network services are no longer available to customers. Apart from the tremendous nancial damage to the network operator, the social consequences of such a network breakdown cannot be underestimated. Since the MTP is the central part of the SS 7 network, it is of crucial importance for network security and reliability. The MTP is published in different versions and should now be what we call "stable." Is it really stable? Does it work properly in real networks? Does it t new requirements so that no further changes within the MTP are needed? Various different implementations have existed for a long time and are used in national as well as the international network. Due to this, an objective is not to p- form any further changes within the MTP in order to avoid compatibility problems with existing and running systems. Experience shows that compatibility problems are always related to further development of the MTP.
Advances in social science research methodologies and data analytic methods are changing the way research in information systems is conducted. New developments in statistical software technologies for data mining (DM) such as regression splines or decision tree induction can be used to assist researchers in systematic post-positivist theory testing and development. Established management science techniques like data envelopment analysis (DEA), and value focused thinking (VFT) can be used in combination with traditional statistical analysis and data mining techniques to more effectively explore behavioral questions in information systems research. As adoption and use of these research methods expand, there is growing need for a resource book to assist doctoral students and advanced researchers in understanding their potential to contribute to a broad range of research problems. "Advances in Research Methods for Information Systems Research: Data Mining, Data Envelopment Analysis, Value Focused Thinking" focuses on bridging and unifying these three different methodologies in order to bring them together in a unified volume for the information systems community. This book serves as a resource that provides overviews on each method, as well as applications on how they can be employed to address IS research problems. Its goal is to help researchers in their continuous efforts to set the pace for having an appropriate interplay between behavioral research and design science.
Business Data Communications and Networking, 14th Edition presents a classroom-tested approach to the subject, combining foundational concepts, practical exercises, and real-world case studies. The text provides a balanced, well-rounded presentation of data communications while highlighting its importance to nearly every aspect of modern business. This fully-updated new edition helps students understand how networks work and what is required to build and manage scalable, mobile, and secure networks. Clear, student-friendly chapters introduce, explain, and summarize fundamental concepts and applications such as server architecture, network and transport layers, network design processes and tools, wired and wireless networking, and network security and management. An array of pedagogical features teaches students how to select the appropriate technologies necessary to build and manage networks that meet organizational needs, maximize competitive advantage, and protect networks and data from cybersecurity threats. Discussions of real-world management and technical issues, from improving device performance to assessing and controlling costs, provide students with insight into the daily networking operations of actual businesses.
Despite the explosion of networking services and applications in the past decades, the basic technological underpinnings of the Internet have remained largely unchanged. At its heart are special-purpose appliances that connect us to the digital world, commonly known as switches and routers. Now, however, the traditional framework is being increasingly challenged by new methods that are jostling for a position in the "next-generation" Internet. The concept of a network that is becoming more programmable is one of the aspects that are taking center stage. This opens new possibilities to embed software applications inside the network itself and to manage networks and communications services with unprecedented ease and efficiency. In this edited volume, distinguished experts take the reader on a tour of different facets of programmable network infrastructure and applications that exploit it. Presenting the state of the art in network embedded management and applications and programmable network infrastructure, the book conveys fundamental concepts and provides a glimpse into various facets of the latest technology in the field. "
This book constitutes the refereed post-conference proceedings of the 4th International Conference on Intelligence Science, ICIS 2020, held in Durgapur, India, in February 2021 (originally November 2020). The 23 full papers and 4 short papers presented were carefully reviewed and selected from 42 submissions. One extended abstract is also included. They deal with key issues in brain cognition; uncertain theory; machine learning; data intelligence; language cognition; vision cognition; perceptual intelligence; intelligent robot; and medical artificial intelligence.
This book proposes the novel network envisions and framework design principles, in order to systematically expound the next generation vehicular networks, including the modelling, algorithms and practical applications. It focuses on the key enabling technologies to design the next generation vehicular networks with various vehicular services to realize the safe, convenient and comfortable driving. The next generation vehicular networks has emerged to provide services with a high quality of experience (QoE) to vehicles, where both better network maintainability and sustainability can be obtained than before. The framework design principles and related network architecture are also covered in this book. Then, the series of research topics are discussed including the reputation based content centric delivery, the contract based mobile edge caching, the Stackelberg game model based computation offloading, the auction game based secure computation offloading, the bargain game based security protection and the deep learning based autonomous driving. Finally, the investigation, development and future works are also introduced for designing the next generation vehicular networks. The primary audience for this book are researchers, who work in computer science and electronic engineering. Professionals working in the field of mobile networks and communications, as well as engineers and technical staff who work on the development or the standard of computer networks will also find this book useful as a reference.
IT Security governance is becoming an increasingly important issue for all levels of a company. IT systems are continuously exposed to a wide range of threats, which can result in huge risks that threaten to compromise the confidentiality, integrity, and availability of information. This book will be of use to those studying information security, as well as those in industry.
The recent advances in display technologies and mobile devices is having an important effect on the way users interact with all kinds of devices (computers, mobile devices, laptops, tablets, and so on). These are opening up new possibilities for interaction, including the distribution of the UI (User Interface) amongst different devices, and implies that the UI can be split and composed, moved, copied or cloned among devices running the same or different operating systems. These new ways of manipulating the UI are considered under the emerging topic of Distributed User Interfaces (DUIs). DUIs are concerned with the repartition of one of many elements from one or many user interfaces in order to support one or many users to carry out one or many tasks on one or many domains in one or many contexts of use - each context of use consisting of users, platforms, and environments. The 20 chapters in the book cover between them the state-of-the-art, the foundations, and original applications of DUIs. Case studies are also included, and the book culminates with a review of interesting and novel applications that implement DUIs in different scenarios.
The development of net-centric approaches for intelligence and national security applications has become a major concern in many areas such as defense, intelligence and national and international law enforcement agencies. In this volume we consider the web architectures and recent developments that make n- centric approaches for intelligence and national security possible. These include developments in information integration and recent advances in web services including the concept of the semantic web. Discovery, analysis and management of web-available data pose a number of interesting challenges for research in w- based management systems. Intelligent agents and data mining are some of the techniques that can be employed. A number of specific systems that are net-centric based in various areas of military applications, intelligence and law enforcement are presented that utilize one or more of such techniques The opening chapter overviews the concepts related to ontologies which now form much of the basis of the possibility of sharing of information in the Semantic Web. In the next chapter an overview of Web Services and examples of the use of Web Services for net-centric operations as applied to meteorological and oceanographic (MetOc) data is presented and issues related to the Navy's use of MetOc Web Services are discussed. The third chapter focuses on metadata as conceived to support the concepts of a service-oriented architecture and, in particular, as it relates to the DoD Net-Centric Data Strategy and the NCES core services.
Blockchain Technology Solutions for the Security of IoT-Based Healthcare Systems explores the various benefits and challenges associated with the integration of blockchain with IoT healthcare systems, focusing on designing cognitive-embedded data technologies to aid better decision-making, processing and analysis of large amounts of data collected through IoT. This book series targets the adaptation of decision-making approaches under cognitive computing paradigms to demonstrate how the proposed procedures, as well as big data and Internet of Things (IoT) problems can be handled in practice. Current Internet of Things (IoT) based healthcare systems are incapable of sharing data between platforms in an efficient manner and holding them securely at the logical and physical level. To this end, blockchain technology guarantees a fully autonomous and secure ecosystem by exploiting the combined advantages of smart contracts and global consensus. However, incorporating blockchain technology in IoT healthcare systems is not easy. Centralized networks in their current capacity will be incapable to meet the data storage demands of the incoming surge of IoT based healthcare wearables.
This volume is number 67 in the series Advances in Computers that began back in 1960. This is the longest continuously published series of books that chronicles the evolution of the computer industry. Each year three volumes are produced presenting approximately 20 chapters that describe the latest technology in the use of computers today. Volume 67, subtitled "Web technology," presents 6 chapters that show the impact that the World Wide Web is having on our society today. The general theme running throughout the volume is the ubiquity of web services. Topics such as wireless access and its problems and reliability of web communications are emphasized.
In the developed world, there is an increasing trend towards the use of e-government to further involve citizens in the maintenance of their country. This is not only an improved way to promote existing methods of citizen engagement such as voting or taxation; it also makes information more accessible and increases opportunities for average citizens to make their voices heard. Cloud Computing Technologies for Connected Government explores the latest research on the use of e-government for enhancing the effectiveness and transparency of public institutions. Featuring coverage on cloud-related frameworks and strategies, barriers to e-government development and practice, and case studies revealing the best guidelines for efficient technology use, this timely publication is indispensable for students, educators, information system specialists, technology experts, and anyone involved in public administration or the management of government departments. This book highlights chapters on a broad scope of topics including, but not limited to, citizen empowerment, collaborative public service, communication through social media, cost benefits of the Cloud, electronic voting systems, identity management, legal issues, and security and privacy for e-government users.
This book provides a comprehensive overview of modern networks design, from specifications and modeling to implementations and test procedures, including the design and implementation of modern networks on chip, in both wireless and mobile applications. Topical coverage includes algorithms and methodologies, telecommunications, hardware (including networks on chip), security and privacy, wireless and mobile networks and a variety of modern applications, such as VoLTE and the internet of things.
Anyone with a computer has heard of viruses, had to deal with several, and has been struggling with spam, spyware, and disk crashes. This book is intended as a starting point for those familiar with basic concepts of computers and computations and who would like to extend their knowledge into the realm of computer and network security. Its comprehensive treatment of all the major areas of computer security aims to give readers a complete foundation in the field of Computer Security. Exercises are given throughout the book and are intended to strengthening the readera (TM)s knowledge - answers are also provided. Written in a clear, easy to understand style, aimed towards advanced undergraduates and non-experts who want to know about the security problems confronting them everyday. The technical level of the book is low and requires no mathematics, and only a basic concept of computers and computations. Foundations of Computer Security will be an invaluable tool for students and professionals alike. |
![]() ![]() You may like...
The Host in the Machine - Examining the…
Angela Thomas-Jones
Paperback
R1,397
Discovery Miles 13 970
Community Engagement in the Online Space
Michelle Dennis, James H Albert
Hardcover
R5,824
Discovery Miles 58 240
Practical Industrial Data Networks…
Steve Mackay, Edwin Wright, …
Paperback
R1,540
Discovery Miles 15 400
|